Professional Documents
Culture Documents
Consensus
Security
Transparency
Decentralization
Immutability
Accountability
The consensus protocols play important role in blockchain. The consensus is called by the
backbone of the blockchain which provides the validator to all the nodes present in the network.
All the nodes in the network verify the transactions by using cryptographic hash function.
All the properties of blockchain can be applied based on consensus protocols that network is
using. It is impossible to hack the blockchain network by hacker due to consensus protocol.
There are various types of consensus used to solve the problem in blockchain.
Following are some consensus protocols:
Proof of work
o This consensus algorithm is used to solve complex mathematical puzzles. The
mathematical puzzles require lot of computational power and then node who solves the
puzzle soon that gets the mine to the next block.
o The bitcoin uses the Proof of Work consensus algorithm. In this consensus the miner is
selected for next block generation.
Practical byzantine fault tolerance (PBFT)
o The PBFT consensus algorithm is used in asynchronous system where no upper bound
on when the response to the request will be received. This consensus algorithm is used
on low overhead time.
o Practical byzantine fault tolerance selves the many problems regarding to byzantine
fault tolerance solution which is available. BFT is the consensus used when some of
the nodes in the network fail to respond or respond incorrect information. This
algorithm is used in blockchain and distributed computing.
This consensus algorithm is used to solve complex mathematical puzzles. The mathematical
puzzles require lot of computational power and then node who solves the puzzle soon that gets
the mine to the next block. The bit coin uses the Proof of Work consensus algorithm.
The mining aspect of bit coins are decided by solving the cryptographic puzzle where random
integer is found which is used to get specified number of leading zeroes in the hash function.
In this consensus the miner is selected for next block generation. The users can validate and
signed every transaction by using public and private key assigned in blockchain network.
Litecoin
Ethereum
Monero coin
Dogecoin
If the solution of the challenge response protocol is known within bounded search space then
the client works may be bounded. The following figure specifies the challenge response
protocol.
The permissioned blockchain has control over participant’s transactions and their role
definition where the access and contribution of participant are seen. The maintaining of identity
of each participant in blockchain on network is called as permissioned blockchain.
The permissioned blockchain is also referred as Consortium Blockchain. This blockchains are
different than private where only known nodes can participate in the network.
The permissioned blockchain can be used by manufacturer producing a product industry where
supply chain management is required. Permissioned blockchain is used in hyper ledger and
chain.
Cons
Immutability
The object which state cannot be modified or changed after it is created is called as
immutable object.
The mutable files can be overwritten, or any changes can be made by participant on
relational database.
In the immutable files the data changes are recorded as separate time stamped file on
immutable database.
Transparency
The transparency in permissioned blockchain may not be important as compared to
permission-less blockchain.
It is depending on how business relationships are set up and how the blockchain is
configured.
The crypto currencies incentives are not built in into some of the permissioned
blockchains.
The primary incentive is to reduce the cost, time and ease of sharing in permissioned
blockchain.
Trustless
Power and trust are shared among all the participant to develop, mine and consume the
network rather than concentrating on single individual or entity.
The consensus mechanism is used to build trust in blockchain network.
The permissioned blockchain uses the different consensus protocols than other permission less
blockchain. There is various consensus are developed today for permissioned blockchain.
Following are the consensus algorithm that are used by permissioned block chain:
Federated Consensus
The nodes in blockchain puts their trust on the set of signers from network which helps them
to reach the consensus stage. The block signer uses the single block generator to receive, hold
and filter all the transactions this process will be carried out in efficient manner.
The block validation process is done by signers on their generator signatures. Every block is
validated with block generator sign and set of conditions which are fulfil by the network.
As the network get enough signatures to the block generator then block will get published to
the network. The federated consensus is useful in security and transparency. This consensus is
used by cross border remittance, real time KYC, etc. Stellar and Ripple blockchain uses the
federated consensus.
The round-based protocol is used to determine the next blockchain at each height of the
blockchain. Each round has three steps as propose, prevote and precommit with two special
steps as commit and new Height. Every propose, prevote and precommit step take one third of
total time allocated by that round.
Each round becomes longer than the previous round by small increase of time. This consensus
s achieves in limited concurrent network. The round robin model is ideal for trade, finance and
supply chain industries. The multichain and tender mint Blok chains uses the round robin
consensus protocol.